Encryption is a method to protect the incoming message by coding the plain text into an encoded one called the cipher text. The main ideology behind encryption is to protect the data transmitted to be secured from any type of attack. There are typically two types of encryptions namely symmetric and asymmetric encryption methods. In this, the encryption algorithm comes under the components of encryption. Decryption is a process of getting the plain text from the encoded text using an encryption key. Encryption Cryptography involves both encryption and decryption, to prevent the data from unauthorized access. The Components of Encryption ... Read More
In this golang article, we will write Go language programs to depict short variable declaration operator using var keyword and variable declaration. In shorthand variable, initialization is done at the time of declaration where it’s not necessary in var keyword. Here, we will use a string method, as well as a count variable method to depict short variable declaration. Algorithm Step 1 − Import the required packages in the program Step 2 − Create a main function Step 3 − In the main use short variable declaration to create strings Step 4 − Print the strings created via shorthand ... Read More
Cloud Computing provides the facility to a wide range of services stored in the cloud or Internet. The Services provided by cloud computing are computer resources, data storage, applications, servers, developmental tools, and networking protocols. It is most popularly used by IT firms and for business requirements. The term “Cloud Computing” was proposed in the year 1950s that gives internet-related services and it emerged from distributed computing to the current technology called cloud computing. Amazon, Google, and Microsoft are some examples of cloud services. Cloud Computing Cloud computing is the services provided on the Internet to store a vast amount ... Read More
In Golang, os and io packages are used for performing various file-r operations like editing, copying, creating, and deleting. In this article, we are going to see three different Examples to create an empty file. In the first Example we will use os.Create from the os package, in the second Example we will use WriteFile function from ioutil package is used and in the third Example we will use NewWriter function from bufio package is used. Syntax os.Create() This function comes from the os package. It helps in the creation of a new file. The filename is given as ... Read More
Wireless Communication Wireless communication is the process of sending voice and other forms of data without the installation of cables and wires. Radio communication systems are used at earlier stages of wireless transmitters, later then modulation is used within transmitters that use electromagnetic signals to send voice, data files, video, or other media signals over the network. Wireless networks connect the network devices to a laptop, tablets, mobile phones, and other support devices to access the internet connection thereby eliminating the physical cabling of wires. After the invention of 4G standards in cellular networking, wireless applications are mostly by the ... Read More
CSMA/CD (Carrier Sense Multiple Access/ Collision Detection) is a networking protocol more precisely it is an Access protocol its standard is IEEE802.3 and used to broadcast links, widely used in Ethernet network systems. It is very effective and easy the implement. But the efficiency of CSMA/CD is an important factor that decides its usage for different types of network topologies and environments. In this article, we will explore the efficiency of CSMA/CD in terms of its capability to handle network congestion and minimize the number of collisions. Working(Basics) of CSMA/CD CSMA/CD works by detecting whether the broadcast channel is idle ... Read More
In Go programming language, Bufio and io package functions will be used to read the text from the given file. In this article, we will use three Examples to read lines from the existing file. In the first Example, we will use NewReader function from the bufio package, in the second Example we will use ReadFile function from ioutil package and in the third Example we will use file.Read function respectively. Syntax func Split(str, sep string) []string Split() function is used to split a string through a provided separator. This function is present in strings package and it accepts ... Read More
In this Golang article we will use ReadFile function from the io/ioutil package, NewScanner function from the bufio packageand as well as NewReader function from the former package respectively to read entire text from the xis=sting file. Syntax bufio.NewReader() This function belongs to Go's bufio package. The primary goal of this function is to read the data in larger chunks instead of line by line and store in buffer. The io.reader and buffer size are passed as arguments in this function. os.Open() This function is a part of os package. It is used to open a file to ... Read More
Fiber optics is one of the technologies used to transmit data through thin glass or plastic fibers. It is mostly used in communication channels like telephone, televisions, and the Internet. Core and cladding are two parts of fiber optic cable. The cladding reflects the light to the core, thus preventing the loss of signal. Fiber optics are mostly used in medical and industry services. In the medical field, it is used for endoscopies, to view and treat internal organs. In industries, it is used in controlling temperature, pressure, and vibrations. Fiber Optics and its Types Definition Fiber optics is defined ... Read More
In ISO OSI layers there are seven layers, and each layer has its characteristics and its protocols. The most important second layer from the bottom is the data link layer. In this data link layer consists of two different layers and MAC is one important layer. MAC is the Medium Access Control layer. MAC layer helps to reduce the collision while transmitting the data. The main functionality of the MAC layer will act as a medium to access the shared resources in the network. So it has the control accessibility of nodes when they are in a shared medium. MAC ... Read More